Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
It has been used in other security investigations of various cryptographic algorithms.
Some of this theoretical research has been incorporated into real cryptographic algorithms.
It is an approach used by many cryptographic algorithms and cryptosystems.
Schneier has been involved in the creation of many cryptographic algorithms.
A protocol describes how the cryptographic algorithms should be used to secure information.
Such systems almost always use symmetric key cryptographic algorithms.
It provides a wide variety of cryptographic algorithms, formats, and protocols.
The embedded chip of a smart card usually implements some cryptographic algorithm.
A timer is used to rotate through various combinations produced by a cryptographic algorithm.
There are two basic types of cryptographic algorithms.
This has bearing on the design of provably unbreakable cryptographic algorithms.
The Feistel construction is also used in cryptographic algorithms other than block ciphers.
For example, a cryptographic algorithm may be implemented by hardware and software that is widely distributed among users.
This one way function behavior makes modular exponentiation a candidate for use in cryptographic algorithms.
Malleability is a property of some cryptographic algorithms.
However, other existing cryptographic algorithms do not appear to be broken by these algorithms.
All cryptographic algorithms are in the crypto card.
It contains both the cryptographic algorithms as well as the key(s) used for encryption.
Government applications, including use within other cryptographic algorithms and protocols, for the protection of sensitive unclassified information.
Cryptographic hash functions are a third type of cryptographic algorithm.
As is often the case with cryptographic algorithms, slight modifications allow both encryption and digital signature.
In designing security systems, it is wise to assume that the details of the cryptographic algorithm are already available to the attacker.
Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
The draft report recommends many cryptographic algorithms, protocols, and techniques, but some of them are recommended only conditionally.
A third class of information theory codes are cryptographic algorithms (both codes and ciphers).